Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
55
views
9
references
Top references
cited by
44
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,802
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Tweakable Block Ciphers
other
Author(s):
Moses Liskov
,
Ronald L. Rivest
,
David Wagner
Publication date
(Online):
September 13 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
9
Record
: found
Abstract
: not found
Article
: not found
New types of cryptanalytic attacks using related keys
Eli Biham
(1994)
0
comments
Cited
45
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
A construction of a cipher from a single pseudorandom permutation
Shimon Even
,
Yishay Mansour
(1997)
0
comments
Cited
34
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
UMAC: Fast and Secure Message Authentication
J. Black
,
S Halevi
,
H. Krawczyk
…
(1999)
0
comments
Cited
28
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2002
Publication date (Online):
September 13 2002
Pages
: 31-46
DOI:
10.1007/3-540-45708-9_3
SO-VID:
c29d64e5-cf9c-49e4-97dc-58458694da31
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Essential Algebraic Structure within the AES
pp. 17
Blockwise-Adaptive Attackers Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC
pp. 31
Tweakable Block Ciphers
pp. 47
The LSD Broadcast Encryption Scheme
pp. 77
Provably Secure Steganography
pp. 93
Flaws in Applying Proof Methodologies to Signature Schemes
pp. 111
Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case
pp. 127
On the Security of RSA Encryption in TLS
pp. 143
Security Analysis of IKE’s Signature-Based Key-Exchange Protocol
pp. 162
GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks
pp. 178
On 2-Round Secure Multiparty Computation
pp. 194
Private Computation — k-Connected versus 1-Connected Networks
pp. 210
Analysis and Improvements of NTRU Encryption Paddings
pp. 226
Universal Padding Schemes for RSA
pp. 242
Cryptanalysis of Unbalanced RSA with Small CRT-Exponent
pp. 257
Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors
pp. 272
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups
pp. 304
(Not So) Random Shuffles of RC4
pp. 320
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
pp. 336
Supersingular Abelian Varieties in Cryptology
pp. 369
Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2
pp. 385
Threshold Password-Authenticated Key Exchange
pp. 401
A Threshold Pseudorandom Function Construction and Its Applications
pp. 417
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products
pp. 433
Hidden Number Problem with the Trace and Bit Security of XTR and LUC
pp. 449
Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security
pp. 481
Deniable Ring Authentication
pp. 499
SiBIR: Signer-Base Intrusion-Resilient Signatures
pp. 515
Cryptanalysis of Stream Ciphers with Linear Masking
pp. 533
The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers
pp. 549
A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction
pp. 565
Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks
pp. 581
Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor
pp. 597
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation
pp. 613
Security Proof for Partial-Domain Hash Signature Schemes
Similar content
1,802
A survey on lightweight block ciphers
Authors:
PK Kushwaha
,
M Singh
,
P Kumar
Compact Architecture for ASIC Implementation of the MISTY1 Block Cipher
Authors:
Dai Yamamoto
,
Jun Yajima
,
Kouichi Itoh
Extended Generalized Feistel Networks Using Matrix Representation to Propose a New Lightweight Block Cipher: Lilliput
Authors:
Thierry Berger
,
Julien Francq
,
Marine Minier
…
See all similar
Cited by
44
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
Authors:
Phillip Rogaway
A Provable-Security Treatment of the Key-Wrap Problem
Authors:
Phillip Rogaway
,
Thomas Shrimpton
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications
Authors:
Mihir Bellare
,
Tadayoshi Kohno
See all cited by